Encryption, authentication, secure boot functionality, and tamper detection are among the best practices used to secure connected computers and servers. These same practices can be part of embedded devices, but usually they cannot be added to a device the way they are often added...